Coverage in this proceedings includes digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, system security and trusted computing, and network security.